Author: Chow Sherman S.M. Yiu Siu-Ming
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.6, Iss.2-3, 2011-11, pp. : 136-146
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
The intersection of retracts of A *
Theoretical Computer Science, Vol. 237, Iss. 1, 2000-04 ,pp. :
MPEG Video Encryption Algorithms
By Bhargava Bharat Shi Changgui Wang Sheng-Yih
Multimedia Tools and Applications, Vol. 24, Iss. 1, 2004-09 ,pp. :
Key Management: The Key to Encryption
EDPACS, Vol. 38, Iss. 4, 2008-10 ,pp. :
Automated Proofs for Asymmetric Encryption
By Courant J. Daubignard M. Ene C. Lafourcade P. Lakhnech Y.
Journal of Automated Reasoning, Vol. 46, Iss. 3-4, 2011-04 ,pp. :